On 11/24/2010 02:58 AM, coderman wrote:
On Tue, Nov 23, 2010 at 10:43 PM, Marsh Ray<[email protected]>  wrote:
....
How about all the weak and insufficiently seeded RNGs out there?

it's more than a little annoying how many accelerated crypto
implementations exist while good entropy is still a scarcity.

why isn't this a native instruction on every architecture?

How would you know if it was working properly? Or backdoored?

How does this feature interact with virtualization? Low power and sleep states? What about variations in manufacturing process?

How hard is it to define such a thing in standard chip design tools? I imagine many tools will complain loudly about nondeterministic states.

What if it suddenly stopped working?
It seems like doing a decent test on each unit shipped would add at least some cost to the part.

Will the chip estimate the amount of entropy it has pooled? How?

Wouldn't you prefer an industrial-strength software entropy pool over a minimum-possible-area instruction that can never be fully tested?

I think a conscientious designer will want entropy from multiple sources, so he probably won't trust the chip to do it all for him, but perhaps it could be used as another input. What sources of entropy are available to the chip designer that are not also available to a software EGD?

How many customers would choose your chip instead of the other brand because of this? Is it worth the risk inherent in any new feature?

How do you market it? How do you keep it from being marketed as something that it isn't?

If it turned out to be weak, would you have to recall the chips? How about products containing it?
This sucker got baked into a lot of smart meters, or so I hear:
http://travisgoodspeed.blogspot.com/2009/12/prng-vulnerability-of-z-stack-zigbee.html

Of course, the answer may still be that it's better to have an instruction for it than not. But the advantages are subtle and hard to quantify, whereas the costs, complexity, and risks of adding it are measurable.

- Marsh
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to